Linux Hits 3% Desktop Market Share

According to Statcounter, the Linux share on the desktop has passed 3% for the first time. GamingOnLinux reports: While it has been close a couple of times, the trend according to their stats is pretty clear that Linux use has been slowly rising over t…

July 12, 2023
Read More >>

Hack The Box: Inject Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Inject Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Inject machine? For the user flag, you will need to execute the PATH Traversal which leaks the framework application where […]

The post Hack The Box: Inject Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

July 9, 2023
Read More >>

StackRot, a new Linux Kernel privilege escalation vulnerability

StackRot is s new security vulnerability in the Linux kernel that could be exploited to gain elevated privileges on a target system. A security vulnerability, dubbed StackRot was found impacting Linux versions 6.1 through 6.4. The issue, tracked as CVE-2023-3269, (CVSS score: 7.8), is a privilege escalation issue that resides in the memory management subsystem. An unprivileged […]

The post StackRot, a new Linux Kernel privilege escalation vulnerability appeared first on Security Affairs.

July 6, 2023
Read More >>

Striker : A Command And Control (C2)

Striker is a simple Command and Control (C2) program. This project is under active development. Most of the features are experimental, with more to come. Expect breaking changes. Features A) Agents B) Backend / Teamserver C) User Interface Installing Striker Clone the repo; $ git clone https://github.com/4g3nt47/Striker.git $ cd Striker The codebase is divided into […]

June 27, 2023
Read More >>

Hack The Box: Stocker Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Stocker Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the Stocker machine? For the user flag, you will need to abuse the JSON exploitation to bypass the login which leads […]

The post Hack The Box: Stocker Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

June 24, 2023
Read More >>